STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to Fortinet FortiGate Firewall NDM Security Technical Implementation Guide

V-234168

CAT II (Medium)

The FortiGate device must enforce the limit of three consecutive invalid logon attempts, after which time it must lock out the user account from accessing the device for 15 minutes.

Rule ID

SV-234168r960840_rule

STIG

Fortinet FortiGate Firewall NDM Security Technical Implementation Guide

Version

V1R5

CCIs

CCI-000044

Discussion

By limiting the number of failed login attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-forcing, is reduced.

Check Content

Log in to the FortiGate GUI with Super-Admin privilege.

1. Open a CLI console, via SSH or available from the GUI.
2. Confirm the output from the following command:
     # show full-configuration system global | grep -i admin-lockout
The output should be:          
          set admin-lockout-duration 900
          set admin-lockout-threshold 3

If the admin-lockout-duration is not set to 900 and admin-lockout-threshold is not set to 3, this is a finding.

Fix Text

Log in to the FortiGate GUI with Super-Admin privilege.

1. Open a CLI console, via SSH or available from the GUI.
2. Run the following commands:
     # config system global
     # set admin-lockout-duration 900
     # set admin-lockout-threshold 3
     # end